I booted a Wheezy 7.8 live CD and everything is working fine on my t61
laptop connecting to my home router. Attached logs of:
wpa_supplicant -i wlan0 -ddd -Dnl80211  -c wpa.conf  &> nl80211aa.log
wpa_supplicant -i wlan0 -ddd -Dwext  -c wpa.conf &> wextaa.log
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'wlan0' conf 'wpa.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpa.conf' -> '/root/wpa.conf'
Reading configuration file '/root/wpa.conf'
ctrl_interface='/var/run/wpa_supplicant2'
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=2):
     47 47                                             GG              
key_mgmt: 0x2
proto: 0x2
pairwise: 0x10
group: 0x10
PSK (ASCII passphrase) - hexdump_ascii(len=44): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='GG'
nl80211: interface wlan0 in phy phy1
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
nl80211: Set mode ifindex 4 iftype 2 (STATION)
netlink: Operstate: linkmode=1, operstate=5
nl80211: Using driver-based off-channel TX
nl80211: driver param='(null)'
nl80211: Regulatory information - country=00
nl80211: 2402-2472 @ 40 MHz
nl80211: 2457-2482 @ 40 MHz
nl80211: 2474-2494 @ 20 MHz
nl80211: 5170-5250 @ 160 MHz
nl80211: 5250-5330 @ 160 MHz
nl80211: 5490-5730 @ 160 MHz
nl80211: 5735-5835 @ 80 MHz
nl80211: 57240-63720 @ 2160 MHz
nl80211: Added 802.11b mode based on 802.11g information
wlan0: Own MAC address: 00:18:de:2c:9b:5d
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wlan0: RSN: flushing PMKID list in the driver
nl80211: Flush PMKIDs
wlan0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface wlan0
WPS: UUID based on MAC address - hexdump(len=16): 8e 3c fe e4 0f 0f 55 32 9e 84 da 35 28 dc 7e 38
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
wlan0: Added interface wlan0
random: Got 20/20 bytes from /dev/random
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Scan trigger
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
nl80211: New scan results available
wlan0: Event SCAN_RESULTS (3) received
nl80211: Received scan results (4 BSSes)
Sorted scan results
00:0f:b5:57:a7:48 freq=2457 qual=0 noise=0 level=-45 flags=0xb
06:0f:b5:57:a7:48 freq=2457 qual=0 noise=0 level=-45 flags=0xb
f8:7b:8c:27:35:10 freq=2437 qual=0 noise=0 level=-85 flags=0xb
2c:b0:5d:3c:d1:84 freq=2437 qual=0 noise=0 level=-86 flags=0xb
wlan0: BSS: Start scan result update 1
wlan0: BSS: Add new id 0 BSSID 00:0f:b5:57:a7:48 SSID 'GG'
wlan0: BSS: Add new id 1 BSSID 06:0f:b5:57:a7:48 SSID 'NETGEAR - 1'
wlan0: BSS: Add new id 2 BSSID f8:7b:8c:27:35:10 SSID 'Amped_SR'
wlan0: BSS: Add new id 3 BSSID 2c:b0:5d:3c:d1:84 SSID 'MMerrr 2.4_PIN'
Add randomness: count=1 entropy=0
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
Add randomness: count=2 entropy=1
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
Add randomness: count=3 entropy=2
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
Add randomness: count=4 entropy=3
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
wlan0: New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=10
WPS: attr type=0x1024 len=10
WPS: attr type=0x1042 len=2
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=10
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=10
WPS: attr type=0x1024 len=10
WPS: attr type=0x1042 len=2
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=10
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=10
WPS: attr type=0x1024 len=10
WPS: attr type=0x1042 len=2
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=10
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:0f:b5:57:a7:48 ssid='GG' wpa_ie_len=0 rsn_ie_len=20 caps=0x431 level=-45
wlan0:    selected based on RSN IE
wlan0:    selected BSS 00:0f:b5:57:a7:48 ssid='GG'
wlan0: Request association: reassociate: 0  selected: 00:0f:b5:57:a7:48  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
wlan0: Automatic auth_alg selection: 0x1
wlan0: RSN: using IEEE 802.11i/D9.0
wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
wlan0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: WPA: using GTK CCMP
wlan0: WPA: using PTK CCMP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Cancelling scan request
wlan0: SME: Trying to authenticate with 00:0f:b5:57:a7:48 (SSID='GG' freq=2457 MHz)
wlan0: No keys have been configured - skip key clearing
wlan0: State: SCANNING -> AUTHENTICATING
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
nl80211: Authenticate (ifindex=4)
  * bssid=00:0f:b5:57:a7:48
  * freq=2457
  * SSID - hexdump_ascii(len=2):
     47 47                                             GG              
  * IEs - hexdump(len=0): [NULL]
  * Auth Type 0
nl80211: Authentication request send successfully
RSN: Ignored PMKID candidate without preauth flag
wlan0: Checking for other virtual interfaces sharing same radio (phy1) in event_scan_results
nl80211: Event message available
nl80211: MLME event 37
nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 18 de 2c 9b 5d 00 0f b5 57 a7 48 00 0f b5 57 a7 48 00 e2 00 00 02 00 00 00
wlan0: Event AUTH (11) received
wlan0: SME: Authentication response: peer=00:0f:b5:57:a7:48 auth_type=0 status_code=0
SME: Authentication response IEs - hexdump(len=0): [NULL]
wlan0: Trying to associate with 00:0f:b5:57:a7:48 (SSID='GG' freq=2457 MHz)
wlan0: State: AUTHENTICATING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Associate (ifindex=4)
  * bssid=00:0f:b5:57:a7:48
  * freq=2457
  * SSID - hexdump_ascii(len=2):
     47 47                                             GG              
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * pairwise=0xfac04
  * group=0xfac04
nl80211: Association request send successfully
nl80211: Event message available
nl80211: New station 00:0f:b5:57:a7:48
wlan0: RX EAPOL from 00:0f:b5:57:a7:48
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: Not associated - Delay processing of received EAPOL frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
nl80211: MLME event 38
nl80211: MLME event frame - hexdump(len=72): 10 00 3a 01 00 18 de 2c 9b 5d 00 0f b5 57 a7 48 00 0f b5 57 a7 48 10 e2 31 04 00 00 02 c0 01 08 82 84 8b 96 8c 98 b0 48 32 04 12 24 60 6c dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
wlan0: Event ASSOC (0) received
wlan0: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 8c 98 b0 48 32 04 12 24 60 6c dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
wlan0: freq=2457 MHz
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=00:0f:b5:57:a7:48
Add randomness: count=5 entropy=4
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=6): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with 00:0f:b5:57:a7:48
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
wlan0: Process pending EAPOL frame that was received just before association notification
wlan0: RX EAPOL from 00:0f:b5:57:a7:48
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=1 type=3 length=95
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlan0:   key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from 00:0f:b5:57:a7:48 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
Get randomness: len=32 entropy=5
random from os_get_random - hexdump(len=32): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
mixed random - hexdump(len=32): [REMOVED]
WPA: Renewed SNonce - hexdump(len=32): ad a7 f9 a0 c5 2e 11 f5 bf 07 81 4d 50 13 39 f1 bc 63 aa f5 9b bf f0 a3 f0 0e ff db 17 dc 48 49
WPA: PTK derivation - A1=00:18:de:2c:9b:5d A2=00:0f:b5:57:a7:48
WPA: Nonce1 - hexdump(len=32): ad a7 f9 a0 c5 2e 11 f5 bf 07 81 4d 50 13 39 f1 bc 63 aa f5 9b bf f0 a3 f0 0e ff db 17 dc 48 49
WPA: Nonce2 - hexdump(len=32): 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): b8 69 88 fa 6c bb 74 1e 5f 30 31 1b ae 82 15 e3
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 ad a7 f9 a0 c5 2e 11 f5 bf 07 81 4d 50 13 39 f1 bc 63 aa f5 9b bf f0 a3 f0 0e ff db 17 dc 48 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 69 88 fa 6c bb 74 1e 5f 30 31 1b ae 82 15 e3 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: Ignore connect event (cmd=46) when using userspace SME
wlan0: RX EAPOL from 00:0f:b5:57:a7:48
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 4c 4a 1a 26 8d e1 a6 85 08 2d d5 bf dd ee ed 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de 60 15 c3 fd ee 11 5e d6 ca 22 69 a5 00 a3 53 00 38 b8 63 b5 2d 85 99 71 3d 8c dd a0 9a 0c 13 76 66 40 a2 0f 33 d1 a9 2f 19 21 75 2b 74 93 9e 54 2b 0f 8b 40 de fb 72 66 d9 9a 7d 59 ff 1f ff 26 e9 24 06 a3 f0 7e ea b7 8d
wlan0: IEEE 802.1X RX: version=1 type=3 length=151
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlan0:   key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28
  key_iv - hexdump(len=16): 4c 4a 1a 26 8d e1 a6 85 08 2d d5 bf dd ee ed 0b
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): de 60 15 c3 fd ee 11 5e d6 ca 22 69 a5 00 a3 53
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 15 80 fa 34 93 65 fa 70 d5 5f a9 b4 ef 61 df d3 46 e8 fa 0e 6f 86 ba 06 88 3f e6 04 66 86 c5 28 4c 4a 1a 26 8d e1 a6 85 08 2d d5 bf dd ee ed 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de 60 15 c3 fd ee 11 5e d6 ca 22 69 a5 00 a3 53 00 38 b8 63 b5 2d 85 99 71 3d 8c dd a0 9a 0c 13 76 66 40 a2 0f 33 d1 a9 2f 19 21 75 2b 74 93 9e 54 2b 0f 8b 40 de fb 72 66 d9 9a 7d 59 ff 1f ff 26 e9 24 06 a3 f0 7e ea b7 8d
RSN: encrypted key data - hexdump(len=56): b8 63 b5 2d 85 99 71 3d 8c dd a0 9a 0c 13 76 66 40 a2 0f 33 d1 a9 2f 19 21 75 2b 74 93 9e 54 2b 0f 8b 40 de fb 72 66 d9 9a 7d 59 ff 1f ff 26 e9 24 06 a3 f0 7e ea b7 8d
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 3 of 4-Way Handshake from 00:0f:b5:57:a7:48 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 1d 9d 3b 7f a7 38 4c 38 2b 2e 2e 54 0e df a2 bf 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00
wlan0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 7a 02 1e 7f 0d a9 76 7e c1 18 c1 c2 6e ab a9 30
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 1e 7f 0d a9 76 7e c1 18 c1 c2 6e ab a9 30 00 00
wlan0: WPA: Installing PTK to the driver
wpa_driver_nl80211_set_key: ifindex=4 alg=3 addr=0x741518 key_idx=0 set_tx=1 seq_len=6 key_len=16
   addr=00:0f:b5:57:a7:48
EAPOL: External notification - portValid=1
wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_nl80211_set_key: ifindex=4 alg=3 addr=0x4a2c7c key_idx=1 set_tx=0 seq_len=6 key_len=16
   broadcast key
wlan0: WPA: Key negotiation completed with 00:0f:b5:57:a7:48 [PTK=CCMP GTK=CCMP]
wlan0: Cancelling authentication timeout
wlan0: State: GROUP_HANDSHAKE -> COMPLETED
wlan0: CTRL-EVENT-CONNECTED - Connection to 00:0f:b5:57:a7:48 completed (auth) [id=0 id_str=]
wpa_driver_nl80211_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: if_removed already cleared - ignore event
nl80211: Event message available
nl80211: Regulatory domain change
wlan0: Event CHANNEL_LIST_CHANGED (31) received
nl80211: Regulatory information - country=US
nl80211: 2402-2472 @ 40 MHz
nl80211: 5170-5250 @ 80 MHz
nl80211: 5250-5330 @ 80 MHz
nl80211: 5735-5835 @ 80 MHz
nl80211: 57240-63720 @ 2160 MHz
nl80211: Added 802.11b mode based on 802.11g information
EAPOL: startWhen --> 0
EAPOL: disable timer tick
wlan0: CTRL-EVENT-TERMINATING - signal 2 received
wlan0: Removing interface wlan0
wpa_driver_nl80211_deauthenticate(addr=00:0f:b5:57:a7:48 reason_code=3)
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x73df90 key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=00:0f:b5:57:a7:48
wlan0: State: COMPLETED -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 1->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wlan0: No keys have been configured - skip key clearing
wlan0: BSS: Remove id 0 BSSID 00:0f:b5:57:a7:48 SSID 'GG'
wlan0: BSS: Remove id 1 BSSID 06:0f:b5:57:a7:48 SSID 'NETGEAR - 1'
wlan0: BSS: Remove id 2 BSSID f8:7b:8c:27:35:10 SSID 'Amped_SR'
wlan0: BSS: Remove id 3 BSSID 2c:b0:5d:3c:d1:84 SSID 'MMerrr 2.4_PIN'
wlan0: Cancelling scan request
wlan0: Cancelling authentication timeout
netlink: Operstate: linkmode=0, operstate=6
nl80211: Set mode ifindex 4 iftype 2 (STATION)
ioctl[SIOCSIWENCODEEXT]: Invalid argument
ioctl[SIOCSIWENCODEEXT]: Invalid argument
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'wlan0' conf 'wpa.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'wpa.conf' -> '/root/wpa.conf'
Reading configuration file '/root/wpa.conf'
ctrl_interface='/var/run/wpa_supplicant2'
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=2):
     47 47                                             GG              
key_mgmt: 0x2
proto: 0x2
pairwise: 0x10
group: 0x10
PSK (ASCII passphrase) - hexdump_ascii(len=44): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='GG'
WEXT: cfg80211-based driver detected
wext: interface wlan0 phy: phy1
rfkill: initial event: idx=1 type=1 op=0 soft=0 hard=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
wlan0: Own MAC address: 00:18:de:2c:9b:5d
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_countermeasures
wlan0: RSN: flushing PMKID list in the driver
wlan0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface wlan0
WPS: UUID based on MAC address - hexdump(len=16): 8e 3c fe e4 0f 0f 55 32 9e 84 da 35 28 dc 7e 38
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
wlan0: Added interface wlan0
random: Got 17/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 10 seconds
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=16
wlan0: Event SCAN_RESULTS (3) received
Received 2555 bytes of scan results (5 BSSes)
Sorted scan results
00:0f:b5:57:a7:48 freq=2457 qual=65 noise=0 level=-45 flags=0xa
06:0f:b5:57:a7:48 freq=2457 qual=65 noise=0 level=-45 flags=0xa
f8:7b:8c:27:35:10 freq=2437 qual=25 noise=0 level=-85 flags=0xa
94:cc:b9:e9:cb:b0 freq=2412 qual=24 noise=0 level=-86 flags=0xa
2c:b0:5d:3c:d1:84 freq=2437 qual=23 noise=0 level=-87 flags=0xa
wlan0: BSS: Start scan result update 1
wlan0: BSS: Add new id 0 BSSID 00:0f:b5:57:a7:48 SSID 'GG'
wlan0: BSS: Add new id 1 BSSID 06:0f:b5:57:a7:48 SSID 'NETGEAR - 1'
wlan0: BSS: Add new id 2 BSSID f8:7b:8c:27:35:10 SSID 'Amped_SR'
wlan0: BSS: Add new id 3 BSSID 94:cc:b9:e9:cb:b0 SSID 'ATT224'
wlan0: BSS: Add new id 4 BSSID 2c:b0:5d:3c:d1:84 SSID 'MMerrr 2.4_PIN'
Add randomness: count=1 entropy=0
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
Add randomness: count=2 entropy=1
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
Add randomness: count=3 entropy=2
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
Add randomness: count=4 entropy=3
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
Add randomness: count=5 entropy=4
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=5): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
wlan0: New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=10
WPS: attr type=0x1024 len=10
WPS: attr type=0x1042 len=2
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=10
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=10
WPS: attr type=0x1024 len=10
WPS: attr type=0x1042 len=2
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=10
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=10
WPS: attr type=0x1024 len=10
WPS: attr type=0x1042 len=2
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=10
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:0f:b5:57:a7:48 ssid='GG' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-45
wlan0:    selected based on RSN IE
wlan0:    selected BSS 00:0f:b5:57:a7:48 ssid='GG'
wlan0: Request association: reassociate: 0  selected: 00:0f:b5:57:a7:48  bssid: 00:00:00:00:00:00  pending: 00:00:00:00:00:00  wpa_state: SCANNING
wlan0: Trying to associate with 00:0f:b5:57:a7:48 (SSID='GG' freq=2457 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Cancelling scan request
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Automatic auth_alg selection: 0x1
wlan0: RSN: using IEEE 802.11i/D9.0
wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
wlan0: WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: WPA: using GTK CCMP
wlan0: WPA: using PTK CCMP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: No keys have been configured - skip key clearing
wlan0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlan0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RSN: Ignored PMKID candidate without preauth flag
wlan0: Checking for other virtual interfaces sharing same radio (phy1) in event_scan_results
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=16
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=18
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=58
AssocResp IE wireless event - hexdump(len=42): 01 08 82 84 8b 96 8c 98 b0 48 32 04 12 24 60 6c dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=24
Wireless event: new AP: 00:0f:b5:57:a7:48
wlan0: Event ASSOCINFO (4) received
wlan0: Association info event
resp_ies - hexdump(len=42): 01 08 82 84 8b 96 8c 98 b0 48 32 04 12 24 60 6c dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Event ASSOC (0) received
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=00:0f:b5:57:a7:48
Add randomness: count=6 entropy=5
random pool - hexdump(len=128): [REMOVED]
random_mix_pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=6): [REMOVED]
random pool - hexdump(len=128): [REMOVED]
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with 00:0f:b5:57:a7:48
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
wlan0: RX EAPOL from 00:0f:b5:57:a7:48
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=1 type=3 length=95
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlan0:   key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from 00:0f:b5:57:a7:48 (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
Get randomness: len=32 entropy=6
random from os_get_random - hexdump(len=32): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
mixed random - hexdump(len=32): [REMOVED]
WPA: Renewed SNonce - hexdump(len=32): 48 05 ed ea a0 19 f9 fc 76 62 ad 88 b4 c8 5d f6 43 50 dd b0 34 ec 2a cb 85 34 f2 10 16 19 5a 07
WPA: PTK derivation - A1=00:18:de:2c:9b:5d A2=00:0f:b5:57:a7:48
WPA: Nonce1 - hexdump(len=32): 48 05 ed ea a0 19 f9 fc 76 62 ad 88 b4 c8 5d f6 43 50 dd b0 34 ec 2a cb 85 34 f2 10 16 19 5a 07
WPA: Nonce2 - hexdump(len=32): e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 7e 80 e0 c0 5e b2 b7 aa 57 45 d6 c3 cb 70 e0 e3
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 48 05 ed ea a0 19 f9 fc 76 62 ad 88 b4 c8 5d f6 43 50 dd b0 34 ec 2a cb 85 34 f2 10 16 19 5a 07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7e 80 e0 c0 5e b2 b7 aa 57 45 d6 c3 cb 70 e0 e3 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: RX EAPOL from 00:0f:b5:57:a7:48
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 4c 4a 1a 24 8d e1 a6 85 08 2d d5 bf dd ee ed 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 69 26 b2 4e 74 91 90 19 c2 fb 73 90 c4 db 3c 00 38 78 c1 68 25 0a f0 a1 23 ea e8 52 d7 2a 2b c5 37 f7 48 ea 98 b7 d2 10 1b ac 32 ab af 3b 98 2c 27 2b aa af 4e f4 eb 85 7a 9f 3a 81 5d 02 72 77 a1 fb b6 e1 0c 35 ec 1e 3e
wlan0: IEEE 802.1X RX: version=1 type=3 length=151
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlan0:   key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1
  key_iv - hexdump(len=16): 4c 4a 1a 24 8d e1 a6 85 08 2d d5 bf dd ee ed 0b
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 62 69 26 b2 4e 74 91 90 19 c2 fb 73 90 c4 db 3c
WPA: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 e3 92 31 79 47 61 5c 92 9a fe 7d 04 20 8e 51 39 1d ef 49 82 c3 a4 df 5a 72 3d 92 83 32 6f e1 e1 4c 4a 1a 24 8d e1 a6 85 08 2d d5 bf dd ee ed 0b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 62 69 26 b2 4e 74 91 90 19 c2 fb 73 90 c4 db 3c 00 38 78 c1 68 25 0a f0 a1 23 ea e8 52 d7 2a 2b c5 37 f7 48 ea 98 b7 d2 10 1b ac 32 ab af 3b 98 2c 27 2b aa af 4e f4 eb 85 7a 9f 3a 81 5d 02 72 77 a1 fb b6 e1 0c 35 ec 1e 3e
RSN: encrypted key data - hexdump(len=56): 78 c1 68 25 0a f0 a1 23 ea e8 52 d7 2a 2b c5 37 f7 48 ea 98 b7 d2 10 1b ac 32 ab af 3b 98 2c 27 2b aa af 4e f4 eb 85 7a 9f 3a 81 5d 02 72 77 a1 fb b6 e1 0c 35 ec 1e 3e
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 3 of 4-Way Handshake from 00:0f:b5:57:a7:48 (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 1d 9d 3b 7f a7 38 4c 38 2b 2e 2e 54 0e df a2 bf 00 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=2): 00 00
wlan0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 77 02 da 69 5e 9c bd 17 e2 f0 c5 06 bf ioctl[SIOCSIWENCODEEXT]: Invalid argument
ioctl[SIOCSIWENCODEEXT]: Invalid argument
69 d2 38
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 77 02 da 69 5e 9c bd 17 e2 f0 c5 06 bf 69 d2 38 00 00
wlan0: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
wlan0: WPA: Key negotiation completed with 00:0f:b5:57:a7:48 [PTK=CCMP GTK=CCMP]
wlan0: Cancelling authentication timeout
wlan0: State: GROUP_HANDSHAKE -> COMPLETED
wlan0: CTRL-EVENT-CONNECTED - Connection to 00:0f:b5:57:a7:48 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
random: Got 3/3 bytes from /dev/random
EAPOL: startWhen --> 0
EAPOL: disable timer tick
wlan0: CTRL-EVENT-TERMINATING - signal 2 received
wlan0: Removing interface wlan0
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wlan0: State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wpa_driver_wext_set_countermeasures
wlan0: No keys have been configured - skip key clearing
wlan0: BSS: Remove id 0 BSSID 00:0f:b5:57:a7:48 SSID 'GG'
wlan0: BSS: Remove id 1 BSSID 06:0f:b5:57:a7:48 SSID 'NETGEAR - 1'
wlan0: BSS: Remove id 2 BSSID f8:7b:8c:27:35:10 SSID 'Amped_SR'
wlan0: BSS: Remove id 3 BSSID 94:cc:b9:e9:cb:b0 SSID 'ATT224'
wlan0: BSS: Remove id 4 BSSID 2c:b0:5d:3c:d1:84 SSID 'MMerrr 2.4_PIN'
wlan0: Cancelling scan request
wlan0: Cancelling authentication timeout
netlink: Operstate: linkmode=0, operstate=6

Reply via email to